From start-ups to small businesses, companies who embrace digital transformation are well placed to outperform the competition
Focus more on your business and spend less time worrying about maintenance, with hassle-free upgrades that save time and optimize costs.
On July 9th 2019, support from Microsoft for SQL Server ended, followed by support from Windows Server 2008 R2 on January 14th 2020. Many businesses are seizing this as a chance to modernise their IT infrastructure and integrate their Windows or SQL upgrade into their wider digital transformation strategy.
Companies that strive to integrate the latest most advanced technology to solve real business challenges often realize higher revenue margins. Without embracing innovation, they risk failure to evolve as a business, and losing out to competitors.
Updating your Windows Server or SQL Server enables you to embrace digital transformation and stay ahead of the curve. By breaking down the migration and modernization process into three steps—Assess, Migrate, and Optimize—you can solve the most pressing migration challenges and deliver the reliability, performance, and security your business stakeholders expect.
To discover how modernizing your Windows or SQL server can help you on your path to digital transformation, get in touch with us today.
When it comes to phone service there is not much difference between providers. They all bring dial tone to your business and route calls to their destination. They all provide the same set of features that users have come to know and use.
What Makes Farmhouse Networking Different
No Introductory Rates: Most local providers will offer an attractive introductory rate to get your business. The only bad part is after one years time you are automatically changed to the regular price which is often $10-$20 more per line.
No Installation Costs: As we are a growing provider of phone services, anyone signing up for phone service with us this year will have no installation costs.
No Bogus Taxes or Fees: We have looked at phone bills from the major local providers and each of them has some bogus tax or fee added to the phone bill. (The only valid ones are Telecommunications Relay Service, Telephone Assistance Program, the Telecommunications Devices Access Program, E911 (VoIP), FCC Regulatory Fee (VoIP), FUSF (VoIP), and P.U.C. Fee – in case you were wondering)
Phone Costs: Unlike computers, there is no reason why you need to buy brand new phones. There are vendor programs that sell re-conditioned phones at much lower costs and they work just as good as the new ones. There is also leasing options available to help ease the pain of purchasing phones too.
Our Prices: We are not out to gouge our clients or nickel / dime them to death as you have already read. The only question now is how much do we charge? For the standard user, the cost of a phone line is only $29.95 per month. The cost of a standard fax line is only $22.50 per month.
Extra Features: We have several features that most of the other providers just don’t. A customer portal that clients can use to chat with fellow employees, check voicemails, track expenses, and make other account changes. A mobile app that can be used to turn your smart phone into an extension of your desk phone and more. Also failover to another phone number – if the power or internet is out you can have your calls routed to any other phone.
If your company uses phones for business, then contact us to see the true difference.
This article came from the need of another local tech company to forward an Exacqvision Web Portal to something other than port 80, as it was already in use. I could not find a detail article on how to accomplish Sophos DNAT while changing the port number:
How to configure Sophos DNAT for an internal server
Navigate to Firewall then click +Add Firewall Rule and select Business Application Policy.
Select Application Template and choose DNAT/Full NAT/Load Balancing.
Fill out the settings as shown below:
Source Zones: WAN (and LAN if needed)
Allowed Client Networks: Any
Destination Host/Network: WAN Interface (#eth0-? whichever one you use)
Services: Either select the service you already created or create a new one for the external port to be used as below
Protected Servers: Select an existing or create a host entry for the internal server.
Protected Zone: Select the Zone in which the host resides (LAN or DMZ).
Change Destination Port(s): Check this then change the port to the internal port.
Click Save to save the configuration.
If your company is using a Sophos router and is unsure of how to configure it, then contact us for assistance in making the best use of your router.
In a new Windows 10 Support article, dated June 28th, Microsoft comes clean that they will no longer be backing up the registry file with its built in backup feature. “This change is by design, and is intended to help reduce the overall disk footprint size of Windows.” They instead recommend that System Restore be enabled and used to recover in case of registry corruption (which by the way uses disk space too).
Ending Registry Backup
The Windows Registry is a hierarchical database that stores low-level settings for Windows 10 and installed applications that rely on it. The kernel, device drivers, services, Security Accounts Manager, and user interface configuration are all in the registry. If the registry is lost then system settings, drivers, user interface tweaks, and many programs will all need to be fixed or re-installed from scratch.
If your company is using the built in Windows Backup feature, then contact us for assistance moving to a system that provides complete backup of your systems.
Farmhouse Networking has had a long standing policy that we do not keep a record of client passwords (except when needed for device administration). That is about to change, but before we talk about our new password policy let’s talk password storage:
Common Password Storage
Here are some popular places where many businesses store their passwords that make them very vulnerable to being stolen.
Passwords written on paper (that are not under lock and key):
On your desk under your keyboard (or taped underneath)
Under your stapler or desk decorations
On sticky notes stuck to your monitor or desk
On a scrap of paper on your desk or in a drawer
In a notebook or address book
In a old-fashioned Rolodex file
Paper printouts or photocopies of your passwords
Anyone with access to your office could easily find and steal passwords stored like this.
Passwords stored in your computer (without using encryption):
Remembered in your web browser
A document called “Passwords” that you’ve created anywhere on your computer, perhaps using Microsoft Word or Excel
A document with any other name on your computer (including the password as the name)
Email drafts that you’ve created (but not sent) containing password information
Anyone with access to your computer could easily find and steal passwords stored like this, including both a person with physical access to it as well as a virus or hacker gaining access via the internet, or scamming you into granting them access, even once.
Passwords stored in your smartphone or tablet (without using encryption):
Electronic “Notes” containing password information
Other documents or emails similar to the ones listed in computer storage above
Anyone with access to your device could easily find and steal passwords stored like this.
Passwords sent via regular (insecure) email:
Emails that you have sent to yourself containing password information
Emails that you have sent to anyone else containing password information
Any information that you send using regular (unencrypted) email puts that information at risk of being stolen. Email is neither private nor secure. Sending an email is like mailing a postcard, and hackers and thieves can easily read the contents. You should never send passwords (or any other confidential or sensitive data) via regular email.
Secure Password Storage
Now for the discussion of Farmhouse Networking’s new password policy. We are partnering with a company to provide a storage of passwords and other client documentation with military grade encryption. This partnership also allows us to address the dangers that common password storage present by offering our clients this same encrypted password storage service. Here are some of the benefits of this service:
Each user has a personal password vault
Shared company password vault
Security groups to manage access
Auditing & reporting (Compliance)
Secure password sharing
1-Click Login Tool (for all major browsers)
Mobile Device Access
Only $15 per month (Compared to Lastpass Business at $4 per user per month)
If your company is using common password storage of any kind do yourself a security favor and contact us to upgrade to secure password storage.
These days, you only need to step away from your desk for a few minutes to have a heap of missed calls and new emails awaiting your return:
What Voicemail to Email Does:
As the name suggests, a Voicemail to Email solution uses artificial intelligence (AI) technology to automatically transcribe voicemails received by a user’s voice mailbox. Voicemail to Email is ideal for busy professionals who can’t be accessible at a moment’s notice, are often in meetings, or in an environment where it’s not feasible to listen to messages in sequential order. Voicemail to Email offers a practical, at-a-glance way to keep up with the messages that need your attention and prioritization. With Voicemail to Email transcription, you can consult your voice messages at a time and place that’s most convenient for you. Users can efficiently hone in on specific transcribed messages to find exactly the information they need – from contact information to payment details to an address for their next meeting.
What are the Benefits of Voicemail to Email?
Maximum Accuracy: Voicemail to Email solution uses Google’s Cloud Speech API for Speech to Text transcription which has better accuracy than many voice transcription solutions. The transcriptions made over our platform represent the truest content of your customers’ voicemails.
Efficiency and Flexibility: Users can read their Voicemail to Email transcriptions at their own convenience – via email, SMS, or a mobile app.
Flexible Billing: Users can choose between a flat rate per line ($4.95 per month) or choose to be billed per transcription ($0.14 per voicemail).
Future Features: We are looking to add Spanish Voicemail to Email transcription to our services in the future. We are also looking to add live call transcription, so that a user can have a complete text transcript of their phone calls in writing emailed to them.
If your company is looking to expand what their phone system can do for them, then contact us for assistance.
In reviewing compliance documentation, we found it necessary to talk about Virtual Private Network (VPN) technology for both privacy and secure remote access. A VPN is a connection to a private network over the internet through an encrypted tunnel – think smuggling information across a secret passageway between two places.
Why use VPN?
Privacy: There has been a huge buzz lately about using VPN technology to help mask you browsing habits from the likes of the NSA or Google. VPN services offer connections that regularly change your external IP address so that a profile (marketing or otherwise) is harder to build. It also makes hacking of your information harder when these services providers offer anti-virus and anti-spam filtering as part of the VPN service.
What are the trade-offs? These VPN service providers will now be the sole owner of your browsing habits – they can sell targeted profiles to marketing companies – so read those terms of service. There will also be a performance hit to your internet speed, so if you are working from a slow network already this may not be an option. Then there is the added cost of an extra $5 to $15 per month for these services on top of your internet bill each month.
Secure Remote Access: This was the original intent of VPN technology and where it really shines. Either from remote workers using coffee shop wifi or remote offices connecting to the main office, VPN tunnels are used to securely access data, servers, and other network resources. This technology is required by all major compliance agencies so that all data transmitted is encrypted during transport. In the past servers would open ports to the internet to allow access, but it was found that this practice allowed hackers the same opportunity to gain access. With VPN tunnels there is another layer of protection from unexpected access. There is also the benefit that no outside provider gets access to your browsing habits.
What are the trade-offs? This will require a router at the main office that is business grade and capable of handling the traffic. It will then require setup of remote workers laptops or remote offices with similar business grade routers.
If your company is concerned about privacy on the internet or secure remote access, then contact us for assistance.
As the last email stated, I would like to give the above pictured computer to a well deserving non-profit or struggling business that would benefit from a technology infusion. There was an underwhelming single response to my request, so I have decided to give the computer to the one suggested organization:
Woodland Charter School
This computer is suitable for normal office work and will be replacing an aging laptop used in there front office by the staff. I will be including free setup of the computer to help get them connected properly.
Please contact us with ideas on who could best use our next free new computer.
We are currently facing the mountain of paperwork and responsibilities associated with the death of a loved one who did not properly prepare for their passing. While thinking through this stuff the thought of disaster preparedness came to mind and what would be the way to properly prepare for the sudden passing of myself or a business partner so that those who remained could continue on. Here are my thoughts:
Partnership / Corporate Agreement: Most states will immediately dissolve / liquidate a business partnership agreement unless the agreement has a continue after death clause that allows the estate to be paid off for their share of the current worth of the business. These payouts can also be paid by an insurance policy. Have an attorney look at the current agreement and amend as needed.
Personal Data: Business partners will need access to a copy of information like social security number, date of birth, birth / marriage / death certificates, and location of all agreements / wills. Having this information easily available saves tons of time for those left behind and make filling out the needed paperwork much easier. This information is best stored in one location like a safe deposit box.
Financial Data: Business partners will need access to insurance information, bank accounts, investment accounts, tax returns, current debts, title / registration of property, and any safe deposit keys that are connected to the business. Knowing this information will help create an estimate of the worth of the business to give the estate their fair share of the current worth. Plus if the partner that passed was in charge of these things it will make it easier for the responsibility to be handed to someone else.
Business Data: Businesses should have a master list of usernames and passwords for all local software, servers, online accounts, key safes, etc. This list needs to be updated regularly and a copy would be best kept in the same safe deposit box that the vital records are kept.
Advanced Directives: Just like for family members, the business partner will need to be able to act on behalf of the business in case the other partner is incapacitated in some way. Having these documents in order before this happens is crucial. Make sure to have a lawyer look over the document to make sure it is complete based on state laws where business is being conducted.
“Key Man” Insurance: If any of the business partners or employees are “indispensable” then key man insurance can be purchased by the business. This insurance policy pays off on death to help the company stay afloat until a replacement can be found. It is also important at this point to think about training and disbursement of business information. No one person in the company should have so much knowledge that they would sink the business even if they just left the organization one day.
Take the time to prepare for the worse to make life for those left behind easier to manage after your passing, and contact us for any assistance you need in this process.
As a partner with Lenovo and Intel, I have been given the opportunity to give one of my clients (or perspective clients) a brand new computer and workstation as pictured above. It contain a new memory cache chip from Intel that they would like some feedback on, so the company that accepts this will have to fill out a survey and be on a single phone interview. The computer will be used with the cache enabled and disabled to see the difference the chip makes. Once the testing is done the computer is FREE to keep.
I would like to give this computer to a well deserving non-profit or struggling business that would benefit from a technology infusion. This computer is suitable for normal office work. I will include free setup of the computer to help get them connected properly. I will decide who gets the computer at the end of March 2019.
Please contact us with ideas on who could best use this free new computer.